Jordan | Amman
Amman Rotana Hotel | May 28 2024 | 09:00 am

Thank you for your interest. This event has concluded.

By submitting this form. I understand Trend Micro will process my personal information in accordance with their Privacy Notice.

Thank you for your interest to attend the Risk to Resilience World Tour. An email will be sent to you shortly to confirm your registration.

AGENDA AT A GLANCE 


START TIME SESSION DETAILS
9:00 AM Welcome & Registration
10:00 AM Keynote | Race Against Threats: Resilience in the Era of Modern Threats

The Risk to Resilience keynote session unpacks a forward-looking analysis of the latest threat research and threat predictions exposing emerging tactics, techniques, and the current characteristics of the cyber threat landscape. Cybersecurity leaders and defenders will gain insights into the adversary's playbook, learning about novel vectors such as AI-driven attacks and evolutions in ransomware. The session is designed to empower cybersecurity professionals with knowledge to anticipate and meet the challenge of these advanced threats.

10:30 AM CISO | On The Fast Track: Winning Strategies for Cyber Consolidation and Communication

Access the strategic advantages of minimizing tool sprawl and consolidating visibility and security controls.
Tailored for senior security leaders, experience the live benefits of a unified platform at play. See how centralized strategies minimize complexity and enhance risk communication to enable you to articulate cybersecurity concerns effectively to executives and board members, particularly in the wake of high-profile breaches. This session offers key insights into leveraging platform integration to maximize existing investments, streamline reporting, drive informed risk-based decision-making, and advocate for a security-aware culture within your organization.

11:00 AM SOC | Supercharged Defense: Rapid Detection & Response

Dive deep into innovative threat detection, investigation and response strategies to modernize SOC and security team performance using the tools already in your kit. We will explore of the latest innovations and impact of generative AI to improve SOC and security performance and how integrated telemetry from native and third-party feeds are working together to accelerate threat identification and yield more complete response. The session includes immersive, scenario-based lessons to deliver practical guidance on how to leverage technology, process, automation, and integration to improve security outcomes.

11:30 AM Coffee break
12:00 PM Ops | Minimize Your Attack Surface: Revolutionizing IT Operations Strategies

What are the opportunities to proactively improve your cybersecurity posture? In this session, explore the impact of real-time attack surface risk management to optimize operational strategies and address modern cyber risks.
Learn how critical components of exposure management, from initial attack surface discovery to the deployment of virtual patching and the pivotal role of next-gen endpoint protection can work together to shrink your attack surface, preemptively strengthen defenses and reduce the likelihood of a breach. Supported by a real-world inspired scenario-based workflow, you will walk away with actionable insights and strategies to elevate your security posture and readiness.

12:30 PM Cloud | Mitigating Risks and Threats in the Cloud

Navigate the cloud security realm in this session focused on mitigating risks and neutralizing threats across multi-cloud environments. Identifying cloud assets is tough and determining which assets require high priority attention can be even more challenging. We'll dissect the layers of cloud exposure management, container security, file security, and workload security, each a cornerstone in building a robust defense-in-depth strategy for cloud infrastructure required for digital modernization projects.

1:00 PM Generative AI — A Cyber Sword with Double Edges

Dive in to the world of cyber generative AI and explore its dual nature as both a potential cybersecurity risk and a valuable tool for security teams. We explore the various ways in which generative AI can be exploited for malicious purposes, including deepfake creation, automated phishing attacks, and the potential generation of sophisticated malware. Conversely, we also examine the innovative applications of generative AI in enhancing cybersecurity measures, such as alert and risk event explanation, custom and prescriptive guidance, advanced threat hunting, and more. This session provides a comprehensive understanding of the challenges and opportunities presented by generative AI in the cybersecurity landscape.

1:15 PM Practical Steps to Measure and Achieve Cyber Resiliency

In today's hyper-connected world, cyberattacks are a looming threat to every organisation. But simply having cyber defences isn't enough. True resilience requires measuring your current risk posture and actively improving it. This presentation delves into practical steps you can take to achieve both. We'll explore key metrics like Mean Time to Detect and Respond, uncover proactive strategies like vulnerability scanning and incident response planning, and highlight the critical role of employee awareness. By fostering a culture of security and continuously adapting to the evolving threat landscape, organisations can not only measure their cyber vulnerability but actively build strong defenses, becoming truly cyber resilient.

1:30 PM Lunch

FEATURED SPEAKERS

Bhavin Gandhi
Architect, Managed Service, MMEA, Trend Micro
Trend Micro
Bilall Issa
Manager Technical UAE, Qatar, Kuwait, Iraq, Levant
Trend Micro
Muath Hassouneh
Sales Engineer, Levant
Trend Micro
Lynn Aoude
Sales Engineer, Qatar
Trend Micro
Tarek Jammoul
Regional Director, Sales - Qatar, Kuwait, Iraq & Levant
Trend Micro
Rashed Dawod
Regional Account Manager, Levant
Trend Micro
Aya Hamed
Regional Account Manager, Levant
Trend Micro
Mayar Gomaa
Sales Engineer
Trend Micro
Bilal Baig
Regional Director, Technical, MMEA
Trend Micro
Speaker Name 10
Speaker Designation
Company name
Speaker Name 11
Speaker Designation
Company name
Speaker Name 12
Speaker Designation
Company name
Speaker Name 13
Speaker Designation
Speaker Name 14
Speaker Designation
Speaker Name 15
Speaker Designation

OUR SPONSORS

Platinum Sponsor

Gold Sponsor

EXPLORE MORE